systems and methods for identification of a controlled-environment facility resident in possession of a contraband communications device capture or otherwise accept managed access data and/or contraband communications device assessment data for contraband communications devices operating in the controlled-environment facility. Controlled-environment facility resident call data for each resident of the controlled-environment facility is gathered from the controlled-environment facility resident communications system. Correlations in the managed access data and/or assessment data with the controlled-environment facility resident communications system call data are analyzed to identify each resident of the controlled-environment facility in possession of a contraband communications device.
|
1. A method for identification of a controlled-environment facility resident in possession of a contraband wireless communications device, the method comprising:
capturing wireless managed access data and/or contraband wireless communications device assessment data for contraband wireless communications devices operating in the controlled-environment facility, by at least one of a wireless managed access system and a contraband wireless communications device assessment system;
gathering, by a controlled-environment facility resident communications system, controlled-environment facility resident communications system call data for each resident of the controlled-environment facility; and
identifying correlations in the wireless managed access data and/or contraband wireless communications device assessment data with the controlled-environment facility resident communications system call data, thereby identifying each resident of the controlled-environment facility in possession of a contraband wireless communications device.
24. A non-transitory computer-readable storage medium having program instructions stored thereon that, upon execution by one or more computer systems associated with a controlled-environment facility resident communications system, causes the one or more computer systems to:
accept wireless managed access data and/or contraband wireless communications device assessment data for contraband wireless communications devices operating in the controlled-environment facility from at least one of a wireless managed access system and a contraband wireless communications device assessment system;
gather controlled-environment facility resident call data for each resident of the controlled-environment facility from the controlled-environment facility resident communications system; and
identify correlations in the wireless managed access data and/or contraband wireless communications device assessment data with the controlled-environment facility resident communications system call data, to thereby identify each resident of the controlled-environment facility in possession of a contraband wireless communications device.
20. A system for identifying a controlled-environment facility resident in possession of a contraband wireless communications device, the system comprising:
at least one of a wireless managed access system and a contraband wireless communications device assessment system configured to capture wireless managed access data and/or contraband wireless communications device assessment data for contraband wireless communications devices operating in the controlled-environment facility;
a controlled-environment facility resident communications system configured to gather controlled-environment facility resident communications system call data for each resident of the controlled-environment facility; and
one or more computer systems configured to:
accept the wireless managed access data and/or contraband wireless communications device assessment data;
gather the controlled-environment facility resident call data for each resident from the controlled-environment facility resident communications system; and
identify correlations in the wireless managed access data and/or contraband wireless communications device assessment data with the controlled-environment facility resident communications system call data, identifying each resident of the controlled-environment facility in possession of a contraband wireless communications device.
2. The method of
3. The method of
4. The method of
captured wireless managed access data and/or contraband wireless communications device assessment data for the contraband wireless communications devices operating in the controlled-environment facility comprises telephone numbers called or text messaged by the contraband wireless communications devices operating in the controlled-environment facility;
gathered controlled-environment facility resident communications system call data comprises telephone numbers called or text messaged by each resident, via the controlled-environment facility resident communications system; and
identifying correlations in the data comprises identifying one or more residents who called or text messaged a same number via the controlled-environment facility resident communications system that appears in the wireless managed access data and/or contraband wireless communications device assessment data for contraband wireless communications devices operating in the controlled-environment facility to identify each resident of the controlled-environment facility in possession of a contraband wireless communications device.
5. The method of
6. The method of
7. The method of
8. The method of
9. The method of
10. The method of
11. The method of
12. The method of
13. The method of
14. The method of
15. The method of
16. The method of
17. The method of
18. The method of
19. The method of
21. The system for identifying a controlled-environment facility resident in possession of a contraband wireless communications device of
22. The system for identifying a controlled-environment facility resident in possession of a contraband wireless communications device of
23. The system for identifying a controlled-environment facility resident in possession of a contraband wireless communications device of
25. The non-transitory computer-readable storage medium of
26. The non-transitory computer-readable storage medium of
27. The non-transitory computer-readable storage medium of
|
The present disclosure relates generally to controlled-environment facilities, more specifically to communications by residents of controlled-environment facilities, and particularly to identification of the possessor(s) of (a) contraband wireless communications device(s) in controlled-environment facilities.
According to the International Centre for Prison Studies, the United States has the highest prison population per capita in the world. In 2009, for example, 1 out of every 135 U.S. residents was incarcerated. Generally, inmates convicted of felony offenses serve long sentences in prison (e.g., federal or state prisons), whereas those convicted of misdemeanors receive shorter sentences to be served in jail (e.g., county jail). In either case, while awaiting trial, a suspect or accused may remain incarcerated. During his or her incarceration, an inmate may have opportunities to communicate with the outside world.
By allowing prisoners to have some contact with friends and family while incarcerated, the justice system aims to facilitate their transition back into society upon release. Traditional forms of contact include telephone calls, in-person visitation, conjugal visits, etc. More recently, technological advances have allowed jails and prisons to provide other types of visitation, including individual-to-individual videoconferences and online chat sessions.
Traditional communication services of controlled-environment facilities (such as correctional facilities) include allowing residents (inmates) to place outbound phone calls to non-residents of the controlled-environment facility. Additionally, non-residents can typically schedule video visitation with residents (inmates) of the controlled-environment facility. Other types of communications available to controlled-environment residents include the ability to exchange email and canned text messages between residents and non-residents of the controlled-environment facility. Basically, all of these forms of communication aim to facilitate communication between a resident of a controlled-environment facility and a non-resident.
However, residents of controlled-environment facilities are typically restricted from unauthorized communications with individuals outside of the controlled-environment facility. For example, in correctional facilities inmates are typically prohibited from unauthorized communications with individuals outside of the correctional facility. Thus, in many controlled-environment facilities, unauthorized cell phones, smartphones, tablet computing devices, and other mobile communications devices that circumvent facility communication systems may be considered contraband. Further, in most correctional institutions, or the like possession of a contraband communications device is considered a violation of facility rules and/or regulations, and therefor may be punishable. Often, once located, the contraband communications device is confiscated.
The use of contraband communications devices within controlled-environment facilities, such as correctional institutions, poses a risk to facility security, an avenue for continued criminal activity for correctional system inmates, and additionally a loss in revenues for facility operators and administration. Controlled-environment facility residents may obtain access to contraband devices through many different sources. Family and friends are a potential source. Similarly, facility staff (e.g. corrections officers) may be a potential source of contraband devices. For example, inmates, or associates of inmates, may pay a member of prison staff, such as a corrections officer or civilian worker, to smuggle a contraband communications device, such as a cell phone, into a correctional institution.
Residents may use the contraband communications device to circumvent facility communication systems, which are often monitored. During the course of communications, inmates may make incriminating admissions, commit further criminal acts, conspire to commit further criminal acts, or leave a trail of incriminating data. Ordinarily, these actions and admissions may be monitored by facility communication systems and investigators. By circumventing the facility communication system, however, it may not be possible to monitor such activities. For example, a correctional facility inmate may use a contraband cell phone to contact gang affiliates in an attempt to direct further criminal activity from within the facility. In another correctional environment example, an inmate may use a contraband smartphone or tablet device to access illegal images, including images of child pornography. In a general controlled-environment facility example, a resident may use the contraband communications device to contact friends and family in an effort to avoid payment of communications fees. Additionally, facilities typically make use of revenues derived from a resident's use of facility communication systems to operate, update, and maintain the facility communications system. When a resident circumvents the facility communication systems, financial revenue is lost, which could otherwise benefit the facility and other inmates and administration thereof. Many other illegal or illicit acts may be perpetrated by the use of contraband communications devices.
Authorities operating the controlled-environment facility often try to identify and avoid unauthorized use of contraband communications equipment. There are some previously known methods for detecting and/or controlling access to contraband communications equipment including jamming of frequencies used for cell phone communications, managed access systems, and use of mobile detection equipment (e.g. “wands”), but each of these methods has substantial drawbacks. For example, jamming of communication frequencies is typically illegal in the United States. Managed access systems may allow access to corrections officers and/or staff, but limit access to unauthorized users within the facility, but such systems typically require significant investment in system installation and configuration. Mobile detection equipment may be circumvented by the inmates by simply turning the power off on the device. Also, over the past several years, the above-mentioned sharp increase in the U.S. inmate population has not been followed by a proportional increase in the number of prison or jail staff. To the contrary, budget pressures in local, state, and federal governments have made it difficult for correctional facilities to maintain an adequate number of wardens, officers, and other administration personnel. Hence, many correctional facilities are often unable to perform investigations with respect to their own inmates, such as using mobile equipment to sweep for contraband mobile communications devices, or the like.
The present invention is directed to systems and methods, which provide for identification of a controlled-environment facility resident in possession of a contraband communications device. Managed access data and/or contraband communications device assessment data for contraband communications devices operating in the controlled-environment facility is captured and controlled-environment facility resident communications system call data for each resident of the controlled-environment facility is gathered. Correlations in the managed access data and/or assessment data with the controlled-environment facility resident communications system call data are identified, thereby identifying each resident of the controlled-environment facility in possession of a contraband communications device.
Hence, a system for identifying a controlled-environment facility resident in possession of a contraband communications device may employ a managed access system and/or a contraband communications device assessment system adapted to capture managed access data and/or contraband communications device assessment data for contraband communications devices operating in the controlled-environment facility. A controlled-environment facility resident communications system may be adapted to gather controlled-environment facility resident communications system call data for each resident of the controlled-environment facility. Further, one or more computer systems (such as the controlled-environment facility resident communications system, or the like) may be adapted to accept the managed access data and/or contraband communications device assessment data, gather the controlled-environment facility resident call data for each resident from the controlled-environment facility resident communications system, and identify correlations in the managed access data and/or assessment data with the controlled-environment facility resident communications system call data, thereby identifying each resident of the controlled-environment facility in possession of a contraband communications device.
The captured managed access data and/or contraband communications device assessment data may include telephone numbers called or messaged by the contraband communications devices operating in the controlled-environment facility. Likewise, the gathered controlled-environment facility resident communications system call data may include telephone numbers called or messaged by each resident, via the controlled-environment facility resident communications system.
Identifying correlations in the managed access data and/or assessment data with the controlled-environment facility resident communications system call data may not only identify a single resident possessing a contraband communications device. Correlations between the controlled-environment facility resident communications system call data of a plurality of residents and the managed access data and/or assessment data of a single contraband communications device operating in the controlled-environment facility may also be identified. This may identify each of a plurality of residents of the controlled-environment facility using the single contraband communications device.
In various embodiments, one or more of the techniques described herein may be performed by one or more computer systems. In other various embodiments, a tangible computer-readable storage medium may have program instructions stored thereon that, upon execution by one or more computer systems, cause the one or more computer systems to execute one or more operations disclosed herein. In yet other various embodiments, one or more systems may each include at least one processor and memory coupled to the processor(s), wherein the memory is configured to store program instructions executable by the processor(s) to cause the system(s) to execute one or more operations disclosed herein.
The foregoing has outlined rather broadly the features and technical advantages of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features and advantages of the invention will be described hereinafter which form the subject of the claims of the invention. It should be appreciated that the conception and specific embodiment disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. It should also be realized that such equivalent constructions do not depart from the invention as set forth in the appended claims. The novel features which are believed to be characteristic of the invention, both as to its organization and method of operation, together with further objects and advantages will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present invention.
Having thus described the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
While this specification provides several embodiments and illustrative drawings, a person of ordinary skill in the art will recognize that the present specification is not limited only to the embodiments or drawings described. It should be understood that the drawings and detailed description are not intended to limit the specification to the particular form disclosed, but, on the contrary, the intention is to cover all modifications, equivalents and alternatives falling within the spirit and scope of the claims. As used herein, the word “may” is meant to convey a permissive sense (i.e., meaning “having the potential to”), rather than a mandatory sense (i.e., meaning “must”). Similarly, the words “include,” “including,” and “includes” mean “including, but not limited to.”
The invention now will be described more fully hereinafter with reference to the accompanying drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. One skilled in the art may be able to use the various embodiments of the invention.
For example, various types of controlled-environment facilities are present in today's society, and persons may be voluntary or involuntary residents of such facilities, whether temporarily or permanently. Examples of controlled-environment facilities may include correctional institutions (e.g., municipal jails, county jails, state prisons, federal prisons, military stockades, juvenile facilities, detention camps, home incarceration environments, etc.), healthcare facilities (e.g., hospitals, nursing homes, mental health facilities, rehabilitation facilities, such as drug and alcohol rehabilitation facilities, etc.), restricted living quarters (e.g., hotels, resorts, camps, dormitories, barracks, etc.), and the like. For convenience of explanation, various examples discussed herein are presented in the context of correctional facilities, or the like. For instance, in some of the embodiments discussed below, a controlled-environment facility may be referred to as a correctional facility, jail or prison, and its residents may be referred to as inmates, arrestees, or detainees. It should be understood, however, that the systems and methods described herein may be similarly applicable to other types of controlled-environment facilities and their respective residents (e.g., a hospital and its patients, a school dormitory and its students, etc.).
The present disclosure relates generally to controlled-environment facilities, more specifically to communications by residents of controlled-environment facilities, and particularly to identification of the possessors of contraband wireless communications devices in controlled-environment facilities, such as analysis of controlled-environment facility resident communications system data in conjunction with Managed Access System (MAS) data and/or communications device assessment data. In accordance with embodiments of the present systems and methods for identification of a controlled-environment facility resident in possession of a contraband communications device, managed access data and/or contraband communications device assessment data for contraband communications devices operating in the controlled-environment facility is captured or otherwise accepted. Controlled-environment facility resident call data for each resident of the controlled-environment facility is gathered from the controlled-environment facility resident communications system. Thereafter, correlations in the managed access data and/or assessment data with the controlled-environment facility resident communications system call data are identified to identify each resident of the controlled-environment facility in possession of a contraband communications device.
Embodiments of the present systems and methods facilitate identification of which controlled environment facility residents are in possession of contraband wireless communications devices through non-physical means. While existing systems and methods may alert controlled-environment facility personnel that they have a contraband communications device problem, these existing systems and methods do not typically afford much usable intelligence as to who has the contraband communications device. As noted, existing hardware devices (e.g. “wands”) can detect a cell phone or the like, while it is turned on, when a user of the hardware is close to the communications device. However residents, particularly savvy residents such as correctional facility inmates, know this and turn their contraband phones off when not in use (as well as to conserve battery in an environment where it is difficult to gain access to charging).
Embodiments of the present systems and methods use MAS data and/or communications device assessment data, such as International Mobile Station Equipment Identity (IMEI) for Global System for Mobile Communications (GSM) devices or Mobile Equipment Identifier (MEID) (which may include Equipment Serial Numbers (ESNs) for older devices) in Code Division Multiple Access (CDMA) devices, phone numbers dialed or texted, and/or the like. This MAS and/or or communications device assessment data is compared to controlled-environment facility resident communications system data (which may be referred to as Resident Telephone System (RTS) data or Inmate Telephone System (ITS) data, in a correctional environment) to obtain patterns and/or correlations between the two data sets. Probabilities are assigned as to which residents/inmates more than likely have the contraband communications device, based on several parameters.
A communications device assessment, which may be a temporary analysis, or the like (e.g. an audit) may use temporarily installed, or mobile, equipment and can provide IMEI/MEID data, where in the facility the communications device was used, location of the called party, call data (such the number called, duration, etc.), and other metadata.
A MAS may be a permanent system installed in or in conjunction with the subject controlled-environment facility. MAS hardware employs antennas and the like, to continuously monitor communications devices operating in the controlled-environment facility, collecting communications device data, such as IMEI/MEIDs, numbers dialed or texted-to, and/or the like. A MAS may act as a cell site at/for the controlled-environment facility, in some embodiments.
A controlled-environment facility resident communications system has all the call data (e.g. Call Detail Records (CDRs)) for the residents/inmates, (i.e. meta data for legitimate resident/inmate communications carried out using controlled-environment facility communications systems).
Embodiments of the present systems and methods, gather call records from contraband communications device call intercepts (such as by MAS and/or an assessment), gather controlled-environment facility resident communications system data, and cross-correlates those two data sets (i.e. the CDRs from the controlled-environment facility resident communications system with IMEI/MEIDs, called numbers, and/or the like, from the MAS and/or an assessment). Such cross-correlation may not only provide identification of the contraband communications device, but also identify the resident that used the device in a particular communication. Data used from the data sets may also include data derived from the data sets, such as frequency of calls, or the like.
Other indicators may help confirm correlation of the two sets of data, such as an indication that a suspected contraband communications device holder has ceased, or at least greatly reduced use of the controlled-environment facility resident communications system, such as may be gleaned from controlled-environment facility resident communications system (frequency of use) data, particularly if such reduction in use of the controlled-environment facility resident communications system corresponds to appearance of the contraband communications device the resident is suspected having.
Thus, embodiments of the present systems and methods, take captured contraband communications device (e.g. cell phone) dialed or texted-to numbers, through MAS or assessment data, and compare them against controlled-environment facility resident communications system data through forensic and other communication analysis tools that analyze communications into and out of controlled-environment facilities to identify high probability residents/inmates who are using contraband communications devices in an automated manner. Hence, embodiments of the present systems and methods correlate resident/inmate to communications device, such as based on calling patterns to provide nonintrusive detection of the party in possession of a contraband communications device.
For instance, residents may access such services using telephones 103 to access certain communication services. In some facilities, residents may use video visitation device(s) 104, which may be referred to as an Intelligent Facility Devices (IFDs), personal computer wireless device 105 adapted or approved for use in controlled-environment facility 102, or the like. For example, a resident may initiate telephone services by lifting the receiver on telephone 103 or IFD 104, or by launching a communication application program on device 105, at which time the resident may be prompted to provide a personal identification number (PIN), other identifying information or biometrics. An interactive voice response (IVR) unit (not shown) may generate and play prompt or other messages to residents on devices 103, 104 and/or 105.
Under the control of communication processing system 101, devices 103, 104 and 105 may be capable of connecting to a non-resident's (i.e., a person not committed to a controlled-environment facility) device 106 or telephone 107 across a publicly switched telephone network (PSTN) 108. For example, device 106 may be a mobile phone, whereas telephone 107 may be located at a non-resident's home or office, an inmate visitation center, etc. Switch 109 in communication processing system 101 may be used to connect calls across PSTN 108. Additionally or alternatively, the non-resident may be at telephone 110 or device 111, which is on an Integrated Services Digital Network (ISDN), Voice-over-IP (VoIP), or packet data network 112, such as, for example the Internet. Router 113 of communication system 101 is used to route data packets associated with a call connection to destination telephone 110 or device 111.
Video visitation device(s) (IFDs) 104 may have video conferencing capabilities to enable residents to participate in video visitation sessions with non-residents of the correctional facility via video call, secure online chat, etc. For example, a non-resident party may have a personal or laptop computer 114 with camera 115. Additionally or alternatively, device 114 may have an integrated camera and display (e.g., a smart phone, tablet computer, etc.). A network connection between the parties may be established and supported by an organization or commercial service that provides computer services and software for use in telecommunications and/or VOIP, such as SKYPE®. Additionally or alternatively, the correctional facility and/or the destination may use videoconferencing equipment compatible with ITU H.323, H.320, H.264, and/or V.80, or other suitable standards. Generally speaking, each video visitation device 104 may be disposed in a visitation room, in a pod, cell, etc. in controlled-environment facility 102.
In some embodiments, video visitation devices 104 may be implemented as a computer-based system. For example, each of video visitation devices 104 may include a display, camera, and handset. The display may be any suitable electronic display such as, for example, a Liquid Crystal Display (LCD), a touchscreen display (e.g., resistive, capacitive, etc.), or the like, whereas the camera may be an suitable imaging device such as, for instance, a video camera or webcam equipped with Charge-Coupled Devices (CCDs), Complementary Metal-Oxide-Semiconductor (CMOS) active pixel sensors, etc. A handset may be similar to a traditional telephone handset including an earpiece portion (with a loudspeaker), a handle portion, and a mouthpiece portion (with a microphone). During a video visitation session, video visitation devices 104 may be configured to capture a video image of a resident to be transmitted to a non-resident using the camera, and to display a video image of the non-resident to the resident using the display. Video visitation devices 104 may also be configured to capture an audio signal from the resident to be transmitted to a non-resident using the mouthpiece portion of the handset, and to provide an audio signal from the non-resident to the resident using the earpiece portion of the handset. Additionally or alternatively, audio received from the non-resident may be reproduced via a loudspeaker, and audio provided by the resident may be captured via a microphone. In some cases, video visitation devices 104 may assume the form of any computer, tablet computer, smart phone, etc., or any other consumer device or appliance with videoconferencing capabilities, such as a wall-mounted tablet computer devices in a hardened case.
In addition to providing certain visitation and communication operations, communication processing system 101 may attempt to ensure that an resident's calls, video conferences, online chats, etc. are performed only with non-residents whose identities, devices, email addresses, phone numbers, etc. are listed in that resident's Pre-Approved Contact (PAC) list. Each resident's PAC list may be stored, for example, in database 116 maintained by Administration and Management System (AMS) 117. In addition to PAC list(s), AMS 117 may also store inmate or resident profile data (RPD), as well as visitation rules applicable to each resident. As an example, in the context of a correctional facility, database 116 may include information such as balances for inmate trust and calling accounts; trial schedule; conviction data; criminal record; sentencing data, such as time served, time remaining to be served, and release date; cell and cellmate assignments; resident restrictions and warnings; commissary order history; telephone call history; call recordings; known or suspected gang or criminal affiliations; known or suspected affiliates, accomplices, or gang members; and any other information that may be relevant or useful to correctional facility staff to house and maintain residents.
In some implementations, communication system 101 may be configured to perform communications monitoring operations configured to monitor and or record telephone and/or video visitations (e.g., as electronic files). In scenarios where communication system 101 is located within the controlled-environment facility, it may have direct access to AMS 117. In other embodiments, however, communication system 101 may be located remotely with respect to the controlled-environment facility, and access to AMS 117 may be obtained via a computer network such as, for example, network 112.
In many controlled-environment facilities, residents are restricted from communicating with persons outside of the controlled-environment facility using any device other than the system described above (103, 104 or 105). Reasons for this include protection of persons outside of the controlled-environment facility from offensive, inappropriate, or illegal contact with a resident. Additionally, these restrictions may help to prevent residents from directing further illegal activity with conspirators located outside of the controlled-environment facility, witness tampering, victim protection etc. Administrators of the controlled-environment facility may wish to limit the residents' contact to parties on the resident's PAC list. Nonetheless, residents often find ways of bypassing the approved communication system. For example, contraband communications devices 120 are often smuggled into controlled-environment facilities.
Managed Access System 122 may be employed in some controlled-environment facility to intercept and manage communications attempted by contraband communications devices (120). Such an MAS may employ a cellular data access point 124 (i.e. a cellular antenna). For example, a dedicated cellular data access point 124 may be placed within (e.g. in or near a center of the controlled-environment facility, as illustrated in
Contraband communications devices assessment system 125 may perform an assessment (audit) of contraband communications device usage in a controlled-environment facility (102). Contraband communications devices assessment system 125 may be temporally deployed within or in conjunction with controlled-environment facility 102 and may employ temporary antennas 126 through 129, or the like, deployed throughout the facility to monitor contraband communications device activity. As with MAS 122 contraband communications devices assessment system 125 may capture contraband communications device IMEIs, MEIDs, phone numbers dialed or messaged, and/or the like.
Embodiments of the present systems and methods are facilitated by collecting as much data as possible about the contraband communications device, such as through MAS 122 or assessment by system 125, and through provisioning of complete call records, such as CDRs, by controlled-environment facility resident communications system 101.
At 206 correlations in the managed access data and/or assessment data with the controlled-environment facility resident communications system call data are identified, to thereby identify each resident of, or other party in, the controlled-environment facility in possession of a contraband communications device.
Hence, in certain embodiments of the present systems and methods, the managed access data and/or contraband communications device assessment data for the contraband communications devices operating in the controlled-environment facility captured at 202 comprises telephone numbers called or messaged by the contraband communications devices operating in the controlled-environment facility. Correspondingly, in such certain embodiments, controlled-environment facility resident communications system call data gathered at 204 comprises telephone numbers called or messaged by each resident, via the controlled-environment facility resident communications system. Therein, identification of correlations in the data at 206 comprises identifying one or more residents who called or messaged a same number via the controlled-environment facility resident communications system that appears in the managed access data and/or contraband communications device assessment data for contraband communications devices operating in the controlled-environment facility. Thereby, each resident of the controlled-environment facility in possession of a contraband communications device may be identified at 206.
In some instances, identifying correlations in the managed access data and/or assessment data with the controlled-environment facility resident communications system call data at 206 might include identifying correlations between the controlled-environment facility resident communications system call data gathered at 204 of a plurality of residents and the managed access data and/or assessment data captured at 202 of a single contraband communications device operating in the controlled-environment facility. Thereby, each of a number of residents of the controlled-environment facility sharing a single contraband communications device may be identified at 206. In such situations, the use of a contraband communications device may be confirmed to a high probability through correlation of the IMEI/MEID of the subject contraband communications device. For example, an IMEI/MEID analysis may be run at 206. Therein, one number called from one IMEI and another number called from the same IMEI would establish that the same contraband communications device was used in the calls. Such a “shared” device may also be an indication that a controlled-environment facility staff member is providing the contraband communications device. In such, or other embodiments, another correlation that may be examined may be an International Mobile Subscriber Identity (IMSI). Examination of the IMSI from calls by contraband communications devices, particularly take in conjunction with IMEI/MEID data may indicate whether individual residents are (each) using their own Subscriber Identity Module (SIM) card with one or more shared contraband communications devices.
In accordance with embodiments of the present systems and methods, employing example implementation 200 in example environment 100 to identify (a) controlled-environment facility resident(s) in possession of contraband communications device(s) 120, MAS 122, contraband communications device assessment system 125, and/or the like is adapted to capture managed access data and/or contraband communications device assessment data for contraband communications devices 120 operating in controlled-environment facility 102, at 202. Controlled-environment facility resident communications processing system 101 (such as, in some embodiments, in conjunction with AMS 117) is adapted to gather controlled-environment facility resident communications system call data for each resident of controlled-environment facility 102, at 204. One or more computer systems, which may include controlled-environment facility resident communications system 101, AMS 117, and/or the like are adapted to accept the managed access data and/or contraband communications device assessment data and gather the controlled-environment facility resident call data for each resident from the controlled-environment facility resident communications system. Whereupon, these one or more computer systems identify correlations in the managed access data and/or assessment data with the controlled-environment facility resident communications system call data at 206 to identify each resident of the controlled-environment facility, or other party in the facility, in possession of a contraband communications device (120).
Various steps may be employed to establish a high-probability that a particular resident has a contraband communications device (120). For example, identifying correlations in the managed access data and/or assessment data with the controlled-environment facility resident communications system call data, such as at 206, may further include determining a threshold volume of calls to one or more telephone numbers called or messaged by a contraband communications devices operating in the controlled-environment facility. This may establish a higher probability that a particular resident, who had called the one or more numbers, via the controlled-environment facility resident communications system, is in possession of a contraband communications device. For example, in accordance with such embodiments, a higher number of calls on the controlled-environment facility resident communications system call data side and/or on the managed access data and/or assessment data side would, either and/or together, be an indication of a higher probability that an identified resident was in possession of an identified contraband communications device.
As another example, identification of correlations in the managed access data and/or assessment data with the controlled-environment facility resident communications system call data at 206 may further include determining multiple phone numbers called or messaged by a contraband communications device that correlate with a single resident of the controlled-environment facility. In still another example, correlations identified at 206 in the managed access data and/or assessment data with the controlled-environment facility resident communications system call data may further include determining a number of residents who have called or messaged numbers. In such embodiments, a lower number of other residents calling a captured number appearing in the suspect resident's resident communications system data may indicate a higher probability the resident is in possession of the subject contraband communications device.
In other examples for establishing a high-probability that a particular resident has a contraband communications device (120), information other than, or in addition to, numbers dialed and/or messaged may be used. For example, identifying correlations in the managed access data and/or assessment data with the controlled-environment facility resident communications system call data at 206 may further or alternatively include detecting when a resident has ceased to use or has greatly reduced use of the controlled-environment facility resident communications system (101) to place calls. This may be viewed as raising the probability that the suspect resident has access to a contraband communications device (120).
As a another example, identifying each party in the controlled-environment facility in possession of a contraband communications device at 206 further comprises correlating information such as maintained in database 116 of AMS 117 as to a housing unit that a resident is located in with contraband communications device location data from the managed access data and/or assessment data. Further in such regard, Global Positioning System (GPS) data from the contraband device may be captured by the managed access system 122 and/or assessment system 125. Such GPS data points can further confirm the party having a contraband device, the more such data points available, the more solidly the possessor is established. For example, the GPS data may be used to determine a resident housing unit, other facility location, a facility staff member (e.g. corrections officer) assigned location, and/or the like, corresponding to a contraband device, to further verify who has the contraband device. In such an example, not only may one or more residents be sharing a device, but a staff member associated with the location (e.g. a corrections officer in an identified cellblock or pod) may be indicated as providing the contraband communications device.
In some examples, captured Billed Number Address (BNA), called or messaged by contraband communications devices may be correlated with resident data from the controlled-environment facility resident communications system to identifying each resident of the controlled-environment facility in possession of a contraband communications device. Also such BNA data and/or captured Location Based Service (LBS) location data of the called number may be correlated in relationship to corrections officers' addresses, resident relative's addresses, and/or the like to further verify the possessor of a contraband communications device, in accordance with some embodiments.
In another example, timing of identified correlated communications may be observed to determine if a contraband communications device used for the correlated communications is being used by more than one resident, at different times, and/or at times during contact with a facility staff member. Use of social media, such as by called parties, may be used to confirm correlations as well. For example, social media use by a friend or family member of a suspected possessor or user of a contraband communications device may be monitored to look for such correlations, such as posts about the suspected possessor soon after a suspected contraband communication, geo-tag data of posted images (of residents), or the like.
As yet another example, call volume after a last identified correlated communication by a contraband communications device used for the correlated communication may be observed to determine the likelihood of the resident that last had possession of the contraband communications device. In some example embodiments, identification of correlations may further or alternatively include correlating captured keywords from messages sent by contraband communications devices with resident data from the controlled-environment facility resident communications system data (such as data maintained on database 116, by AMS 117) to identifying each resident of the controlled-environment facility in possession of a contraband communications device. In such embodiments as described above, and/or in further embodiments emoticons, other special characters relatively unique alphanumeric combinations, and/or combinations thereof, in text messages may be tracked to identify, or help confirm the identity, of the possessor of contraband communications device. Further, emoticons, other special characters, relatively unique alphanumeric combinations, and/or combinations thereof, may be analyzed to detect their use as code, or the like.
Further, with respect to text messages, a “fake” text message reply may be sent to a text message from a contraband device, spoofing a phone number or other identifier of a party texted using the contraband device. Also, a “silent” text may be sent to a contraband communications device as a “ping,” such as to confirm the contraband device is turned on, in a particular location (e.g. using GPS data such as discussed above) and/or the like.
Using this data, controlled-environment facility resident communications system data for the facility, and the analytics of the present systems and methods, the goal is to identify, to a high probability, users of contraband communications devices that were detected during the assessment. In such an implementation, a “bounce list” of the unique dialed phone numbers may be generated and compared to controlled-environment facility resident communications system data for the facility to provide a list of phone numbers in common between the assessment and the controlled-environment facility resident communications system. For purposes of the illustrated examples, a number of the unique dialed phone numbers are found to have been contacted by residents of the controlled-environment facility, via the controlled-environment facility resident communications system and of this number, some of the contacted phone numbers were found to have been contacted by one resident multiple times, via the controlled-environment facility resident communications system.
With attention directed to
With attention directed to
With attention directed
In the example illustrated in
Embodiments of the present systems and methods for contraband wireless communications device identification in controlled-environment facilities, as described herein, may be implemented or executed, at least in part, by one or more computer systems. One such computer system is illustrated in
As illustrated, example computer system 600 includes one or more processors 610 coupled to a system memory 620 via an input/output (I/O) interface 630. Example computer system 600 further includes a network interface 640 coupled to I/O interface 630, and one or more input/output devices 650, such as video device(s) 660 (e.g., a camera), audio device(s) 670 (e.g., a microphone and/or a speaker), and display(s) 680. Computer system 600 may also include a cursor control device (e.g., a mouse or touchpad), a keyboard, etc. Multiple input/output devices 650 may be present in computer system 600 or may be distributed on various nodes of computer system 600. In some embodiments, similar input/output devices may be separate from computer system 600 and may interact with one or more nodes of computer system 600 through a wired or wireless connection, such as over network interface 640.
In various embodiments, computer system 600 may be a single-processor system including one processor 610, or a multi-processor system including two or more processors 610 (e.g., two, four, eight, or another suitable number). Processors 610 may be any processor capable of executing program instructions. For example, in various embodiments, processors 610 may be general-purpose or embedded processors implementing any of a variety of instruction set architectures (ISAs), such as the x86, POWERPC®, ARM®, SPARC®, or MIPS® ISAs, or any other suitable ISA. In multi-processor systems, each of processors 610 may commonly, but not necessarily, implement the same ISA. Also, in some embodiments, at least one processor 610 may be a graphics processing unit (GPU) or other dedicated graphics-rendering device.
System memory 620 may be configured to store program instructions and/or data accessible by processor 610. In various embodiments, system memory 620 may be implemented using any suitable memory technology, such as static random access memory (SRAM), synchronous dynamic RAM (SDRAM), nonvolatile/Flash-type memory, or any other type of memory. As illustrated, program instructions and data implementing certain operations, such as, for example, those described in connection with
In some embodiments, I/O interface 630 may be configured to coordinate I/O traffic between processor 610, system memory 620, and any peripheral devices in the device, including network interface 640 or other peripheral interfaces, such as input/output devices 650. In some embodiments, I/O interface 630 may perform any suitable protocol, timing or other data transformations to convert data signals from one component (e.g., system memory 620) into a format usable by another component (e.g., processor 610). In some embodiments, I/O interface 630 may include support for devices attached through various types of peripheral buses, such as a variant of the Peripheral Component Interconnect (PCI) bus standard or the Universal Serial Bus (USB) standard, for example. In some embodiments, the function of I/O interface 630 may be split into two or more separate components, such as a north bridge and a south bridge, for example. In addition, in some embodiments, some or all of the functionality of I/O interface 630, such as an interface to system memory 620, may be incorporated into processor 610.
Network interface 640 may be configured to allow data to be exchanged between computer system 600 and other devices attached to a network, such as other computer systems, or between nodes of computer system 600. In various embodiments, network interface 640 may support communication via wired or wireless general data networks, such as any suitable type of Ethernet network, for example; via telecommunications/telephony networks such as analog voice networks or digital fiber communications networks; via storage area networks such as Fiber Channel SANs, or via any other suitable type of network and/or protocol.
As shown in
A person of ordinary skill in the art will appreciate that computer system 600 is merely illustrative and is not intended to limit the scope of the disclosure described herein. In particular, the computer system and devices may include any combination of hardware or software that can perform the indicated operations. Additionally, the operations performed by the illustrated components may, in some embodiments, be performed by fewer components or distributed across additional components. Similarly, in other embodiments, the operations of some of the illustrated components may not be provided and/or other additional operations may be available. Accordingly, systems and methods described herein may be implemented or executed with other computer system configurations.
Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present invention. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.
Patent | Priority | Assignee | Title |
10104235, | Apr 16 2015 | Algoblu Holdings Limited | Forwarding roaming call to VoIP system |
10192070, | Oct 04 2017 | GLOBAL TEL*LINK CORPORATION | System and method for providing controlled environment resident status |
10609089, | Dec 20 2017 | Securus Technologies, LLC | Influencing the location of contraband wireless communications devices within controlled-environment facilities |
11452064, | Mar 09 2020 | Rankin Labs, LLC | Locating and detecting mobile communication devices in a defined geographic area |
Patent | Priority | Assignee | Title |
20100105416, | |||
20100279627, | |||
20130023247, | |||
20140080445, | |||
20140164178, | |||
20140194084, | |||
20140253322, | |||
20140254777, | |||
20140270126, | |||
20150207927, | |||
20160007201, | |||
20160191484, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Sep 08 2015 | BAKER, MARK | SECURUS TECHNOLOGIES, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 040342 | /0237 | |
Sep 08 2015 | SOLID, KELLY S | SECURUS TECHNOLOGIES, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 040342 | /0237 | |
Sep 09 2015 | Securus Technologies, Inc. | (assignment on the face of the patent) | / | |||
Nov 01 2017 | SECURUS TECHNOLOGIES, INC | DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENT | FIRST LIEN SECURITY AGREEMENT | 044779 | /0573 | |
Nov 01 2017 | SECURUS TECHNOLOGIES HOLDINGS, INC | DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENT | FIRST LIEN SECURITY AGREEMENT | 044779 | /0573 | |
Nov 01 2017 | Satellite Tracking of People LLC | DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENT | SECOND LIEN SECURITY AGREEMENT | 044368 | /0969 | |
Nov 01 2017 | SECURUS TECHNOLOGIES, INC | DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENT | SECOND LIEN SECURITY AGREEMENT | 044368 | /0969 | |
Nov 01 2017 | SECURUS TECHNOLOGIES HOLDINGS, INC | DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENT | SECOND LIEN SECURITY AGREEMENT | 044368 | /0969 | |
Nov 01 2017 | Satellite Tracking of People LLC | DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENT | FIRST LIEN SECURITY AGREEMENT | 044779 | /0573 | |
Dec 13 2019 | SECURUS TECHNOLOGIES, INC | Securus Technologies, LLC | CHANGE OF NAME SEE DOCUMENT FOR DETAILS | 053476 | /0289 | |
Jun 26 2023 | Securus Technologies, LLC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 064699 | /0842 | |
Jun 26 2023 | Satellite Tracking of People LLC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 064699 | /0842 | |
Jun 26 2023 | ALLPAID, INC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 064699 | /0842 | |
Aug 04 2023 | Satellite Tracking of People LLC | DEUTSCHE BANK AG NEW YORK BRANCH | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 064600 | /0451 | |
Aug 04 2023 | Securus Technologies, LLC | DEUTSCHE BANK AG NEW YORK BRANCH | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 064600 | /0451 | |
Dec 29 2023 | Satellite Tracking of People LLC | DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENT | PRIORITY FIRST LIEN PATENT SECURITY AGREEMENT | 066567 | /0620 | |
Dec 29 2023 | ALLPAID, INC | DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENT | PRIORITY FIRST LIEN PATENT SECURITY AGREEMENT | 066567 | /0620 | |
Dec 29 2023 | Securus Technologies, LLC | DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENT | PRIORITY FIRST LIEN PATENT SECURITY AGREEMENT | 066567 | /0620 | |
Dec 29 2023 | ALLPAID, INC | WILMINGTON SAVINGS FUND SOCIETY, FSB AS COLLATERAL AGENT | PRIORITY SECOND LIEN PATENT SECURITY AGREEMENT | 066436 | /0420 | |
Dec 29 2023 | Satellite Tracking of People LLC | WILMINGTON SAVINGS FUND SOCIETY, FSB AS COLLATERAL AGENT | PRIORITY SECOND LIEN PATENT SECURITY AGREEMENT | 066436 | /0420 | |
Dec 29 2023 | Securus Technologies, LLC | WILMINGTON SAVINGS FUND SOCIETY, FSB AS COLLATERAL AGENT | PRIORITY SECOND LIEN PATENT SECURITY AGREEMENT | 066436 | /0420 | |
Mar 28 2024 | Satellite Tracking of People LLC | WILMINGTON SAVINGS FUND SOCIETY, FSB | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 066951 | /0054 | |
Mar 28 2024 | Securus Technologies, LLC | WILMINGTON SAVINGS FUND SOCIETY, FSB | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 066951 | /0054 | |
Mar 28 2024 | AVENTIV TECHNOLOGIES, LLC | WILMINGTON SAVINGS FUND SOCIETY, FSB | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 066951 | /0054 | |
Mar 28 2024 | ALLPAID, INC | DEUTSCHE BANK AG NEW YORK BRANCH AS COLLATERAL AGENT | SUPER-PRIORITY FIRST LIEN PATENT SECURITY AGREEMENT | 066945 | /0310 | |
Mar 28 2024 | Satellite Tracking of People LLC | DEUTSCHE BANK AG NEW YORK BRANCH AS COLLATERAL AGENT | SUPER-PRIORITY FIRST LIEN PATENT SECURITY AGREEMENT | 066945 | /0310 | |
Mar 28 2024 | Securus Technologies, LLC | DEUTSCHE BANK AG NEW YORK BRANCH AS COLLATERAL AGENT | SUPER-PRIORITY FIRST LIEN PATENT SECURITY AGREEMENT | 066945 | /0310 | |
Mar 28 2024 | ALTER DOMUS US LLC | ALLPAID, INC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 066951 | /0385 | |
Mar 28 2024 | ALTER DOMUS US LLC | Securus Technologies, LLC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 066951 | /0385 | |
Mar 28 2024 | ALTER DOMUS US LLC | AVENTIV TECHNOLOGIES, LLC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 066951 | /0385 | |
Mar 28 2024 | ALLPAID, INC | WILMINGTON SAVINGS FUND SOCIETY, FSB | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 066951 | /0054 |
Date | Maintenance Fee Events |
Aug 16 2021 | REM: Maintenance Fee Reminder Mailed. |
Dec 14 2021 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Dec 14 2021 | M1554: Surcharge for Late Payment, Large Entity. |
Date | Maintenance Schedule |
Dec 26 2020 | 4 years fee payment window open |
Jun 26 2021 | 6 months grace period start (w surcharge) |
Dec 26 2021 | patent expiry (for year 4) |
Dec 26 2023 | 2 years to revive unintentionally abandoned end. (for year 4) |
Dec 26 2024 | 8 years fee payment window open |
Jun 26 2025 | 6 months grace period start (w surcharge) |
Dec 26 2025 | patent expiry (for year 8) |
Dec 26 2027 | 2 years to revive unintentionally abandoned end. (for year 8) |
Dec 26 2028 | 12 years fee payment window open |
Jun 26 2029 | 6 months grace period start (w surcharge) |
Dec 26 2029 | patent expiry (for year 12) |
Dec 26 2031 | 2 years to revive unintentionally abandoned end. (for year 12) |